Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?

One of the first go-to resources for law enforcers and cybercrime investigators is the WHOIS database. WHOIS domain search tools such as WHOIS Lookup provide rich information about a particular domain name or IP address. more

Domain Squatting Disputes: How WHOIS Lookup Tools Can Help

Reverse domain name hijacking (RDNH) can be considered a severe threat to any honest-to-goodness small business or your average website owner. more

GoDaddy Announces Agreement to Acquire Brandsight

Earlier today, GoDaddy announced an agreement to acquire Brandsight. To say that we are thrilled would be an understatement – we couldn't be happier about it. Over the past three years, the Brandsight team has leveraged today's technology along with deep industry experience to build next-generation corporate domain management solutions that are redefining the market. more

Fight Against Phishing: Email Address Verification as a Cybersecurity Process

Phishing keeps making much noise in the realm of cybersecurity, and not in a good way. A majority of cyber attacks start with a phishing email, making the tactic responsible, at least partially, for close to 90% of data breaches. more

.bank and .insurance Join the Neustar Family

Neustar is pleased to announce that it is now the Registry Service Provider (RSP) for the .bank and .insurance Top-Level Domains (TLDs). Operated by fTLD Registry Services, LLC, a coalition of banks, insurance companies and financial services trade associations from around the world, .bank and .insurance are "restricted TLDs" that were created to provide additional levels of trust, verification and security to the highly regulated banking and insurance industries. more

CSC at RSA and the Cybersecurity Tech Accord Reception

CSC is a signatory of the Cybersecurity Tech Accord. If you are attending RSA in San Francisco, please join us at the Cybersecurity Tech Accord Reception on Tuesday, February 25, at 5:30 p.m. more

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Typosquatting is also known as "URL hijacking," and for good reason. Just as hijackers unlawfully seize a vehicle, typosquatters take over a domain name and use it for malicious activities. more

How to Avoid Fraudulent Classifieds Sites with WHOIS Domain Name Search Tools

When visitors fail to recognize that the site they visit is a fraudulent copy of that of a famous brand, they can expose themselves to cybercrime and other attacks. As part of these attacks, typosquatting is a common technique that hackers use to lure victims. They create websites that very closely resemble that of the brand they are trying to hijack so the victims would not have a clue that it is fake. more

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

IP spoofing is a cyberattack technique that entails using a device or a network to fool users into thinking the attacker is part of a legitimate entity. Often, cybercriminals use this method to access computers in a target network to obtain sensitive information, turn systems into zombies, or launch a denial-of-service (DoS) attack. more

What Services Should Be Part of Your Domain Brand Protection Strategy?

Gone are the days when a single department in an organization shouldered the responsibility for a company's brand protection strategy. A research paper that discussed the future of online brand protection shows that inter-department involvement, starting with the board's approval and support, down to the implementation of the strategy by different departments, is required. more

Online Brand Protection Tips with Domain Brand Protection Software

The more popular a brand is, the more customers buy its products. That same popularity makes it a lucrative target for infringers to sell counterfeits. As such, it has become a must for global brands to use brand protection software to make sure their reputation and consumers do not suffer. more

Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse

Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own to implicate a victim or move a case forward. more



Sponsored byThreat Intelligence Platform

New TLDs

Sponsored byAfilias


Sponsored byWhoisXML API

DNS Security

Sponsored byAfilias


Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Brand Protection

Sponsored byAppDetex

Domain Names

Sponsored byVerisign